Red Team // Purple Team

kuorashi

Offensive operator specialized in adversary simulation.

3+
Years
5+
Pentests
3
Certifications
kuorashi@ops:~$
$ cat ./profile.json
{   "alias": "kuorashi",   "role": "Red Team Operator",   "specialty": [     "Active Directory",     "Adversary Simulation",     "Red Team",     "Purple Team"   ],   "spirit": "Zoro",   "style": "Santoryu ⚔⚔⚔",   "location": "France",   "status": "available" }
$ ./check_certs.sh
✓ CPTS — Certified Penetration Testing Specialist ✓ CRTP — Certified Red Team Professional ✓ CRTO — Certified Red Team Operator
$ # Three swords. One goal.
// 01

About

Passionate red teamer.

Specialized in Active Directory environments, EDR/AV evasion techniques, and purple-team exercise design. I document my research and projects on this blog.

Like Zoro mastering three blades, I combine offensive, defensive, and analytical disciplines to strengthen your teams' defensive capabilities.

CPTS CRTP CRTO Red Team Purple Team MITRE ATT&CK Active Directory
// 02

Arsenal

Cobalt Strike
C2 / Beacon Ops
Sliver
Open-Source C2
BloodHound
AD Attack Graph
Rubeus / Kerbrute
Kerberos Attacks
Mimikatz
Credential Dump
Impacket Suite
Protocol Exploitation
NetExec
Network Exploitation
Responder / NTLMrelay
Relay Attacks
EvilGinx / GoPhish
Phishing Operations
Metasploit
Exploitation Framework
PowerView / ADModule
AD Enumeration
Custom Payload Dev
DLL / EXE / BOF
AD Trust Attacks
Cross-Domain / Forest
Delegation Abuse
Constrained / Uncons.
ACL / SID Abuse
Privilege Escalation
Burp Suite
Web Pentesting
Nmap / Masscan
Reconnaissance
PowerShell / Python
Scripting & Automation
Linux Privesc
OS Exploitation
Windows Privesc
OS Exploitation
Wireshark
Traffic Analysis
Volatility
Memory Forensics
OSINT
Open Source Intelligence
MITRE ATT&CK
Adversary Framework
Purple Team Ops
Joint Exercise Design
Red Team Planning
Scenario & TTP Design
Wazuh
SIEM / Detection
Sigma Rules
Detection Engineering
Threat Intelligence
TTP Mapping & Analysis
// 03

Research

See all articles →
// 04

Contact

Available for red team, purple team, or pentest engagements.

pgp_public_key.asc
-----BEGIN PGP PUBLIC KEY BLOCK-----

xjMEZ7HO9BYJKwYBBAHaRw8BAQdAhOuh2RnlAfqWR2EqKy1RdTJk3AjZuVK9
T1EGufWJP73NJ2t1b3Jhc2hpQHByb3Rvbi5tZSA8a3VvcmFzaGlAcHJvdG9u
Lm1lPsKPBBMWCABBBQJnsc70CRCScpg6ewzCeBYhBPQMGS+0ACc3MGaOxJJy
mDp7DMJ4AhsDAh4BAhkBAwsJBwIVCAMWAAIFJwkCBwIAAJJQAP4iB8SNoxSX
Wv5OIeoE/mQGN1i46xodQxxj7R23Mv1EzQEAmitUHfxoIm1L9WTEXhiuK8a3
mIbZaz8HZN+iR/G6BwjOOARnsc70EgorBgEEAZdVAQUBAQdABgDyl03ZcSYT
2GsF8JMo1qV/GDIM4pn8qIr+k9fJbgkDAQoJwngEGBYIACoFAmexzvQJEJJy
mDp7DMJ4FiEE9AwZL7QAJzcwZo7EknKYOnsMwngCGwwAAPzlAP9kv5U/LCmL
QmKlUYzwg5pLkAqUq9eUomhwa3GOigLGwwEA8rNRlLilScmZBIwMOiuhymzv
8IjJW5YEG8uBe58emwA=
=5i+D
-----END PGP PUBLIC KEY BLOCK-----